US20140006333A1 - Correcting inferred knowledge for expired explicit knowledge - Google Patents
Correcting inferred knowledge for expired explicit knowledge Download PDFInfo
- Publication number
- US20140006333A1 US20140006333A1 US13/924,209 US201313924209A US2014006333A1 US 20140006333 A1 US20140006333 A1 US 20140006333A1 US 201313924209 A US201313924209 A US 201313924209A US 2014006333 A1 US2014006333 A1 US 2014006333A1
- Authority
- US
- United States
- Prior art keywords
- statements
- explicit
- inferred
- deleted
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012423 maintenance Methods 0.000 claims abstract description 34
- 238000000034 method Methods 0.000 claims description 103
- 238000012360 testing method Methods 0.000 claims description 25
- 239000011159 matrix material Substances 0.000 description 17
- 238000010586 diagram Methods 0.000 description 7
- 241001465754 Metazoa Species 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
Definitions
- the present subject matter generally relates to computing, and more particularly, relates to reason maintenance systems or belief revision systems.
- RDF Resource Description Framework
- RDFS Resource Description Framework Schema
- OWL Web Ontology Language
- OWL was developed to allow knowledge to be inferred from an explicit set of RDF information using inference rules, which further restricts the values of subjects, predicates, and objects. Because inferred knowledge is dependent on explicit knowledge, falsities in inferred knowledge come into existence when the explicit knowledge expires or is deleted. Thus, there is a need to compute the truth of inferred knowledge and restore consistency.
- One aspect includes a system form of the present subject matter which recites a system of hardware for implementing reason maintenance.
- the system comprises a piece of reasoner hardware whose structure has a capacity to communicate with a piece of inferred knowledge hardware and whose structure has a capacity to compute RDF inferred statements.
- the system further comprises a piece of reason maintenance hardware whose structure is capable of orchestrating a computation of correctness of the RDF inferred statements without stored truth maintenance information when one or more RDF explicit statements are deleted from an RDF database.
- Another aspect includes a method form of the present subject matter which recites a method for reason maintenance of an RDF database.
- the method comprises receiving explicit statements including a set of deleted explicit statements.
- the method also comprises computing inferred statements from the explicit statements.
- the method further comprises finding a set of inferred statements to be deleted from the inferred statements to facilitate correctness of the inferred statements without using stored truth maintenance information.
- a further aspect includes a computer-readable medium form of the present subject matter which recites a computer-readable medium, which is non-transitory, having computer-executable instructions stored thereon for implementing a method for reason maintenance of an RDF database.
- the method comprises receiving explicit statements including a set of deleted explicit statements.
- the method also comprises computing inferred statements from the explicit statements.
- the method further comprises finding a set of inferred statements to be deleted from the inferred statements to facilitate correctness of the inferred statements without using stored truth maintenance information.
- FIG. 1 is a block diagram illustrating archetypical pieces of hardware suitable for computing the truth of inferred knowledge when explicit knowledge expires or is deleted without the use of truth maintenance information in accordance with one embodiment of the present subject matter;
- FIG. 2 is a pictorial diagram illustrating an archetypical data structure that contains explicit knowledge in the form of RDF explicit statements in accordance with one embodiment of the present subject matter
- FIG. 3 is a pictorial diagram illustrating an archetypical data structure that contains inference rules for inferring RDF inferred knowledge in accordance with one embodiment of the present subject matter
- FIG. 4 is a pictorial diagram illustrating an archetypical data structure that contains statements which act as input queries to an RDF database in accordance with one embodiment of the present subject matter
- FIG. 5 is pictorial diagram illustrating an archetypical data structure that contains identified RDF statements in accordance with one embodiment of the present subject matter.
- FIGS. 6A-6H are process diagrams illustrating a method for facilitating correctness of inferred knowledge without truth maintenance information when explicit knowledge expires or is deleted in accordance with one embodiment of the present subject matter.
- Various embodiments of the present subject matter are engineered to maintain inferred closure of RDF data in the context of incremental retraction of asserted statements.
- a few embodiments of the present subject matter are engineered to compute the truth value of inferred knowledge in the form of RDF statements and restore consistency of the inferred knowledge.
- a number of embodiments of the present subject matter are engineered to facilitate correctness of the inferred knowledge without truth maintenance information when explicit knowledge expires or is deleted.
- a system 100 is a database management system for RDF which is suitable to infer information (implicit data or derived data or inferred data or derived information) that is derived from user data (explicit data) and a set of inference rules.
- the system 100 computes derived data in a number of ways.
- the system 100 may actuate a forward-chaining hardware 112 whose structure computes the derived information whenever the explicit data changes.
- the set of inference rules are applied to the explicit data to compute the inferred data. Any new inferred data found this way is reused as input to rule-evaluation until no more derived information can be derived.
- Another way to compute derived data is to actuate a backward-chaining hardware 114 by the system 100 , where the derived information is computed as needed when RDF databases 116 are accessed (query-answering).
- the set of inference rules are examined to determine which of them might produce results that satisfy the query and the bodies of the set of inference rules are substituted into the query expression and re-evaluated recursively.
- FIG. 2 illustrates a matrix 200 that contains explicit knowledge in the form of RDF explicit statements.
- the first row recites a first explicit statement, whose identifier is “1”, whose subject is recited as “ex:worksAt,” whose predicate is recited as “rdfs:doman,” and whose object is recited as “ex:Person.”
- the second row recites a second explicit statement whose identifier is “2”, whose subject is recited as “ex:Person,” whose predicate is recited as “owl:equivalentClass,” and whose object is recited as “ex:Human.”
- the third row recites a third explicit statement whose identifier is “3”, whose subject is recited as “ex:Human,” whose predicate is recited as “rdfs:subClassOf,” and whose object is recited as “ex:Animal.”
- the fourth row recites a fourth explicit statement whose identifier is “4”, whose subject is recited as “ex:Peter,” whose predicate is recited
- FIG. 3 illustrates the matrix 300 comprising three columns and three rows. The first column recites the name of an inference rule. The second column recites an “If” test.
- the third column recites an action following the execution of the “If” test, which in this instance is titled “Then.”
- the first row recites the first inference rule whose name is “prp-dom,” whose tests include “T(?p, rdfs:domain, ?c)” and “(T(?x, ?p, ?y),” and whose action recites “T(?x, rdf:type, ?c).”
- the second row recites the second inference rule whose name is “cax-eqc1,” whose tests include “(T(?c 1 , owl:equivalentClass, ?c 2 )” and “T(?x, rdf:type, ?c 1 ),” and whose action recites “T(?x, rdf:type, ?c 2 ).”
- the third row recites the third inference rule whose name is “cax-sco,” whose tests include “(T(?c 1 , rd
- the system 100 uses the inference rules of the matrix 300 to compute inferred statements illustrated in a matrix 400 .
- FIG. 4 illustrates the matrix 400 , which recites computed inferred statements in five columns and three rows.
- the first column is titled “Input,” and contains explicit statements and inference rules to be applied to produce an inferred statement that is contained in the last three columns.
- the second column is titled “#”, and identifies textually the nomenclature of a computed inferred statement.
- the third column is titled “Subject,” and comprises a portion of a tuple of an RDF statement that is the computed inferred statement.
- the fourth column is titled “Predicate,” and signifies the predicate of the computed inferred statement.
- the last column is titled “Object,” and indicates the object portion of the computed inferred statement.
- the first row recites a first computed inferred statement whose input includes “Statements 1 and 4 with rule prp-dom,” whose nomenclature is “A”, whose subject, predicate, and object are recited as “ex:Peter,” “rdf:type,” and “ex:Person.”
- the second row recites a second computed inferred statement whose input includes “Statements 2 and A with rule cax-eqc1,” whose nomenclature is “B”, and whose subject, predicate, and object are recited as “ex:Peter,” “rdf:type,” and “ex:Human.”
- the third row recites a third computed inferred statement whose input includes “Statements 3 and B with rule prp-dom,” whose nomenclature is “C”, and whose subject, predicate, and object are recited as “ex:Peter,”
- the system 100 avoids imposing a scalability restriction on the number of explicit statements stored in the RDF databases 116 .
- the system 100 can identify those inferred statements that suitably should be removed whenever an explicit statement is deleted (retracted).
- the system 100 dynamically computes the truth using a combination of the forward-chaining hardware 112 and the backward-chaining hardware 114 .
- the system 100 is time-efficient, computes faster than a full re-computation, and need not use any long-lived truth maintenance information (space-efficient).
- the system 100 includes an explicit knowledge hardware 102 whose structure is suitable for receiving explicit knowledge (explicit data or user data) in a form of explicit statements in RDF format. (See the matrix 200 of FIG. 2 ).
- the explicit knowledge hardware 102 is communicable with an expired explicit knowledge hardware 104 whose structure is capable of receiving explicit statements that have expired or are to be deleted or retracted.
- the explicit knowledge hardware 102 forwards explicit knowledge in the form of explicit statements to a piece of reasoner hardware 122 , whose structure has a capacity to communicate with a piece of inferred knowledge hardware 106 .
- the inferred knowledge hardware 106 is a piece of hardware whose structure has a capacity to compute inferred knowledge (implicit data or derived data) as inferred statements in RDF using a piece of rule execution hardware 108 .
- the rule execution hardware 108 is a structure suitable for executing a set of inference rules (see the matrix 300 of FIG. 3 ) on the explicit statements to produce inferred knowledge in the form of inferred statements.
- the inferred knowledge hardware 106 is communicable with a piece of expired inferred knowledge hardware 110 whose structure is capable of computing expired inferred knowledge in the form of expired inferred statements (see the matrix 400 of FIG. 4 ).
- the structure of the reasoner hardware 122 is suitable for communicating with a piece of reason maintenance hardware 124 whose structure is capable of orchestrating the computation of the truth or correctness of the inferred statements.
- the structure of the reason maintenance hardware 124 is communicable with a piece of expired inferred knowledge hardware 110 which uses a piece of forward-chaining hardware 112 whose structure has the capacity to execute forward-chaining inferences.
- the structure of the expired inferred knowledge hardware 110 is also communicable with a piece of backward-chaining hardware 114 whose structure is capable of computing backward-chaining inferences.
- the structure of the reason maintenance hardware 124 is communicable with one or more RDF databases 116 to remove expired inferred statements stored in the RDF databases 116 when certain explicit statements are expired or are to be deleted or retracted.
- a piece of RDF retrieval hardware 120 accesses refreshed RDF information in the RDF databases 116 via a cloud 118 .
- FIG. 5 illustrates a matrix 500 that contains both the explicit statements and the computed inferred statements stored in the RDF databases 116 .
- the matrix 500 is presented in four columns.
- the first column is titled “#”, and recites either numerically or textually an identifier of an explicit or inferred statement that follows on a row.
- the second column is titled “Subject,” and recites the subject of either the explicit or inferred statement.
- the third column is titled “Predicate,” and recites the predicate portion of either the explicit or inferred statement.
- the last column is titled “Object,” and recites the object portion of the inferred or explicit statement.
- the first row recites an explicit statement whose identifier is “1”, whose subject is “ex:worksAt,” whose predicate is recited as “rdfs:domain,” and whose object is recited as “ex:Person.”
- the second row recites an explicit statement whose identifier is “2”, whose subject is “ex:Person,” whose predicate is recited as “owl:equivalentClass,” and whose object is recited as “ex:Human.”
- the third row recites an explicit statement whose identifier is “3”, whose subject is “ex:Human,” whose predicate is recited as “rdfs:subClassOf,” and whose object is recited as “ex:Animal.”
- the fourth row recites an explicit statement whose identifier is “4”, whose subject is “ex:Peter,” whose predicate is recited as “ex:worksAt,” and whose object is recited as “ex:IBM.”
- FIGS. 6A-6H are process diagrams implementing a method 6000 for facilitating correctness of inferred knowledge without stored truth maintenance information when explicit knowledge expires.
- the method 6000 proceeds to a set of method steps 6002 defined between a continuation terminal (“Terminal A”) and another continuation terminal (“Terminal B”).
- the set of method steps 6002 executes steps which are capable of receiving explicit statements some of which have expired (or been deleted).
- Terminal A FIG. 6B
- the method proceeds to block 6008 where the method receives an RDF document.
- the method extracts explicit knowledge (explicit statements) in RDF tuples (subjects, predicates, and objects) from the RDF document.
- a test is performed to determine whether there are one or more pieces of knowledge that have expired. If the answer to the test at decision block 6012 is NO, the method proceeds to Terminal A and skips back to block 6008 where the above-identified processing steps are repeated. If the answer to the test at decision block 6012 is YES, the method proceeds to block 6014 where the method marks the piece or pieces of knowledge (explicit statement[s]) that have expired or are to be deleted. The method then continues to Terminal B.
- the method proceeds to a set of method steps 6004 defined between a continuation terminal (“Terminal C”) and another continuation terminal (“Terminal D”).
- the set of method steps 6004 executes steps having a capacity to compute inferred statements from the explicit statements.
- Terminal C FIG. 6C
- the method proceeds to block 6016 where the method receives a set of inference rules.
- the method then continues to another continuation terminal (“Terminal C1”) and further proceeds to block 6018 where, using the set of inference rules, the method infers a piece of inferred knowledge (inferred statement).
- the method then proceeds to decision block 6020 where a test is performed to determine whether there is additional knowledge to be inferred.
- the method continues to Terminal C1 and skips back to block 6018 where the above-identified processing steps are repeated. Otherwise, if the answer to the test at decision block 6020 is NO, the method proceeds to block 6022 where the method collates pieces of inferred knowledge (as a set or sets of inferred statements). The method then continues to Terminal D.
- the method proceeds to a set of method steps 6006 defined between a continuation terminal (“Terminal E”) and another continuation terminal (“Terminal F”).
- the set of method steps 6006 executes steps suitable for finding a set of inferred statements to be deleted to facilitate correctness of the inferred knowledge.
- Terminal E FIG. 6D
- the method proceeds to block 6024 where the method sets a visited flag of each explicit statement to be deleted as false (meaning that the method has not computed the ramification of an expiry of a piece of explicit knowledge).
- the method copies a set of expired explicit statements (E) to temporary variables (F and B) in preparation for truth maintenance computation. The method then continues to another continuation terminal (“Terminal E1”).
- the method proceeds further to decision block 6028 where a test is performed to determine whether there is no expired explicit statement whose visited flag has a false value. If the answer to the test at decision block 6028 is YES, the method continues to another continuation terminal (“Terminal E9”). Otherwise, if the answer to the test at decision block 6028 is NO, the method proceeds to another continuation terminal (“Terminal E2”). From Terminal E2 ( FIG. 6D ), the method proceeds to block 6030 where the method selects an expired explicit statement in the temporary variable F and sets its visited flag to be true. The method then continues to another continuation terminal (“Terminal E3”).
- the method proceeds to block 6032 where the method executes forward-chaining computation by executing the set of inference rules.
- the method allows each inference rule to make joins across a sum of statements, one summand being the set of explicit statements E and the other summand being the set of inferred statements J.
- the method disallows any joins to be made from any expired explicit statements in the temporary variable F.
- the method stores the output of the forward-chaining computation with a set of expired inferred statements (to be deleted) (K). The method then continues to another continuation terminal (“Terminal E4”). From Terminal E4 ( FIG. 6E ), the method proceeds to block 6040 where the method selects a statement in the temporary variable B.
- the method prepares to execute backward-chaining computation on the selected statement.
- the method then continues to another continuation terminal (“Terminal E5”).
- the method proceeds to block 6044 where the method creates a modified rule.
- the modified rule is created by substituting the values of the subject, predicate, and object from the selected statement into the heads of rules R and a rule's bodies (or rules' bodies).
- the method then uses the modified rule as a query to an RDF database.
- the method allows a query answering process to use a sum of statements as input, one summand being the set of explicit statements E and the other being the set of inferred statements J.
- the method disallows any input statements to be formed from any expired explicit statements in the temporary variable F.
- the method attempts to obtain a result from application of any of the rules based on the rule's bodies. The method then continues to another continuation terminal (“Terminal E6”).
- the method proceeds to a decision block 6056 where a test is performed to determine whether the selected statement can be computed from other statements. If the answer to the test at decision block 6056 is NO, the method continues to another continuation terminal (“Terminal E7”). Otherwise, if the answer to the test at decision block 6056 is YES, the method proceeds to block 6058 , where the method removes the selected statement from the temporary variable B and copies the contents of the temporary variable B into the temporary variable F. The method then continues to Terminal E7 and further proceeds to decision block 6060 where a test is performed to determine whether the temporary variable B has another statement. If the answer to the test at decision block 6060 is NO, the method proceeds to another continuation terminal (“Terminal E8”). Otherwise, if the answer to the test at decision block 6060 is YES, the method proceeds to Terminal E4 and skips back to block 6040 where the above-identified processing steps are repeated.
- the method proceeds to decision block 6062 where a test is performed to determine whether the temporary variable F has another statement. If the answer to the test at decision block 6062 is NO, the method proceeds to Terminal E1 and skips back to decision block 6028 where the above-identified processing steps are repeated. Otherwise, if the answer to the test at decision block 6062 is YES, the method proceeds to Terminal E2 and skips back to block 6030 where the above-identified processing steps are repeated. From Terminal E9 ( FIG. 6H ), the method proceeds to block 6064 where the method sets the set of expired inferred statement K to the contents of the temporary variable F without any of the expired explicit statements L. At block 6066 , the method facilitates a computation of truth maintenance information without committing a full re-computation or using any truth maintenance information. The method then continues to Terminal F and terminates execution.
Abstract
An RDF reason maintenance system avoids imposing a scalability restriction on the number of explicit statements stored in RDF databases. The system can identify those inferred statements that suitably should be removed whenever an explicit statement is deleted (retracted). The system dynamically computes the truth using a combination of the forward-chaining hardware and the backward-chaining hardware. The system is time-efficient, computes faster than a full re-computation, and need not use any long-lived truth maintenance information (space-efficient).
Description
- This application claims the benefit of Provisional Application No. 61/662,685, filed Jun. 21, 2012, which is incorporated herein by reference.
- The present subject matter generally relates to computing, and more particularly, relates to reason maintenance systems or belief revision systems.
- An ontological database uses Resource Description Framework (RDF), Resource Description Framework Schema (RDFS), and Web Ontology Language (which has come to be known as OWL). RDF is a notion that any knowledge can be represented as a tuple or statement expressing a collection of resources, such as a subject, predicate, and object. While RDF does not impose any limits for the subjects, predicates, and objects, RDFS adds rules to constrain the values of the subjects, predicates, and objects to certain domains and ranges. After RDFS was introduced, it was felt there was a need for patterns of knowledge to be expressed as rules. OWL was developed to allow knowledge to be inferred from an explicit set of RDF information using inference rules, which further restricts the values of subjects, predicates, and objects. Because inferred knowledge is dependent on explicit knowledge, falsities in inferred knowledge come into existence when the explicit knowledge expires or is deleted. Thus, there is a need to compute the truth of inferred knowledge and restore consistency.
- This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
- One aspect includes a system form of the present subject matter which recites a system of hardware for implementing reason maintenance. The system comprises a piece of reasoner hardware whose structure has a capacity to communicate with a piece of inferred knowledge hardware and whose structure has a capacity to compute RDF inferred statements. The system further comprises a piece of reason maintenance hardware whose structure is capable of orchestrating a computation of correctness of the RDF inferred statements without stored truth maintenance information when one or more RDF explicit statements are deleted from an RDF database.
- Another aspect includes a method form of the present subject matter which recites a method for reason maintenance of an RDF database. The method comprises receiving explicit statements including a set of deleted explicit statements. The method also comprises computing inferred statements from the explicit statements. The method further comprises finding a set of inferred statements to be deleted from the inferred statements to facilitate correctness of the inferred statements without using stored truth maintenance information.
- A further aspect includes a computer-readable medium form of the present subject matter which recites a computer-readable medium, which is non-transitory, having computer-executable instructions stored thereon for implementing a method for reason maintenance of an RDF database. The method comprises receiving explicit statements including a set of deleted explicit statements. The method also comprises computing inferred statements from the explicit statements. The method further comprises finding a set of inferred statements to be deleted from the inferred statements to facilitate correctness of the inferred statements without using stored truth maintenance information.
- The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:
-
FIG. 1 is a block diagram illustrating archetypical pieces of hardware suitable for computing the truth of inferred knowledge when explicit knowledge expires or is deleted without the use of truth maintenance information in accordance with one embodiment of the present subject matter; -
FIG. 2 is a pictorial diagram illustrating an archetypical data structure that contains explicit knowledge in the form of RDF explicit statements in accordance with one embodiment of the present subject matter; -
FIG. 3 is a pictorial diagram illustrating an archetypical data structure that contains inference rules for inferring RDF inferred knowledge in accordance with one embodiment of the present subject matter; -
FIG. 4 is a pictorial diagram illustrating an archetypical data structure that contains statements which act as input queries to an RDF database in accordance with one embodiment of the present subject matter; -
FIG. 5 is pictorial diagram illustrating an archetypical data structure that contains identified RDF statements in accordance with one embodiment of the present subject matter; and -
FIGS. 6A-6H are process diagrams illustrating a method for facilitating correctness of inferred knowledge without truth maintenance information when explicit knowledge expires or is deleted in accordance with one embodiment of the present subject matter. - Various embodiments of the present subject matter are engineered to maintain inferred closure of RDF data in the context of incremental retraction of asserted statements. A few embodiments of the present subject matter are engineered to compute the truth value of inferred knowledge in the form of RDF statements and restore consistency of the inferred knowledge. A number of embodiments of the present subject matter are engineered to facilitate correctness of the inferred knowledge without truth maintenance information when explicit knowledge expires or is deleted.
- A
system 100 is a database management system for RDF which is suitable to infer information (implicit data or derived data or inferred data or derived information) that is derived from user data (explicit data) and a set of inference rules. Thesystem 100 computes derived data in a number of ways. Thesystem 100 may actuate a forward-chaining hardware 112 whose structure computes the derived information whenever the explicit data changes. In this case, the set of inference rules are applied to the explicit data to compute the inferred data. Any new inferred data found this way is reused as input to rule-evaluation until no more derived information can be derived. Another way to compute derived data is to actuate a backward-chaining hardware 114 by thesystem 100, where the derived information is computed as needed whenRDF databases 116 are accessed (query-answering). In this case, the set of inference rules are examined to determine which of them might produce results that satisfy the query and the bodies of the set of inference rules are substituted into the query expression and re-evaluated recursively. - When a conventional database management system for RDF, which is different from the
system 100, uses only forward-chaining, maintaining the correctness of the inferred data when explicit data is modified is difficult because either it is entirely recomputed (computationally expensive) or it is updated incrementally. In the former case, the time taken is excessive when dealing with large datasets, and in the latter case, this is often achieved by keeping track of which statements lead to each inferred statement, a process called “truth maintenance”. Using a “truth maintenance” technique, removing an explicit statement entails a look-up of which inferred statements to remove. However, the amount of truth maintenance information grows faster than the size of the explicit data, which makes it impractical for large datasets. In contrast, thesystem 100 is capable of forward-chaining inference, but its pieces of hardware maintain the correctness of inferred information without the need to re-compute all inferred information when any explicit data is deleted and without the need to keep truth maintenance information. - Consider the following example.
FIG. 2 illustrates amatrix 200 that contains explicit knowledge in the form of RDF explicit statements. There are four columns, the first column identifying an identifier (numerical) of an explicit statement, the second column indicating the subject of the explicit statement, the third column indicating the predicate, and the last column indicating the object. The first row recites a first explicit statement, whose identifier is “1”, whose subject is recited as “ex:worksAt,” whose predicate is recited as “rdfs:doman,” and whose object is recited as “ex:Person.” The second row recites a second explicit statement whose identifier is “2”, whose subject is recited as “ex:Person,” whose predicate is recited as “owl:equivalentClass,” and whose object is recited as “ex:Human.” The third row recites a third explicit statement whose identifier is “3”, whose subject is recited as “ex:Human,” whose predicate is recited as “rdfs:subClassOf,” and whose object is recited as “ex:Animal.” The fourth row recites a fourth explicit statement whose identifier is “4”, whose subject is recited as “ex:Peter,” whose predicate is recited as “ex:worksAt,” and whose object is recited as “ex:IBM.” - When the explicit statements of the
matrix 200 are stored in an RDF database, such asvarious RDF databases 116, queries to theRDF databases 116 will return results based on the explicit statements of thematrix 200 as well as inferred statements computed by applying the set of inference rules to the explicit statements of thematrix 200. There can be many inference rules, but for the sake of simplicity, consider a set of inference rules illustrated by a matrix 300.FIG. 3 illustrates the matrix 300 comprising three columns and three rows. The first column recites the name of an inference rule. The second column recites an “If” test. And the third column recites an action following the execution of the “If” test, which in this instance is titled “Then.” The first row recites the first inference rule whose name is “prp-dom,” whose tests include “T(?p, rdfs:domain, ?c)” and “(T(?x, ?p, ?y),” and whose action recites “T(?x, rdf:type, ?c).” The second row recites the second inference rule whose name is “cax-eqc1,” whose tests include “(T(?c1, owl:equivalentClass, ?c2)” and “T(?x, rdf:type, ?c1),” and whose action recites “T(?x, rdf:type, ?c2).” The third row recites the third inference rule whose name is “cax-sco,” whose tests include “(T(?c1, rdfs:subClassOf, ?c2)” and “T(?x, rdf:type, ?c1),” and whose action recites “T(?x, rdf:type, ?c1).” - The
system 100 uses the inference rules of the matrix 300 to compute inferred statements illustrated in amatrix 400.FIG. 4 illustrates thematrix 400, which recites computed inferred statements in five columns and three rows. The first column is titled “Input,” and contains explicit statements and inference rules to be applied to produce an inferred statement that is contained in the last three columns. The second column is titled “#”, and identifies textually the nomenclature of a computed inferred statement. The third column is titled “Subject,” and comprises a portion of a tuple of an RDF statement that is the computed inferred statement. The fourth column is titled “Predicate,” and signifies the predicate of the computed inferred statement. The last column is titled “Object,” and indicates the object portion of the computed inferred statement. The first row recites a first computed inferred statement whose input includes “Statements Statements 2 and A with rule cax-eqc1,” whose nomenclature is “B”, and whose subject, predicate, and object are recited as “ex:Peter,” “rdf:type,” and “ex:Human.” The third row recites a third computed inferred statement whose input includes “Statements 3 and B with rule prp-dom,” whose nomenclature is “C”, and whose subject, predicate, and object are recited as “ex:Peter,” “rdf:type,” and “ex:Animal.” - Even with this simple example, it is not immediately clear, using pencil and paper, the reasons that statement C “ex:Peter rdf:type ex:Animal” should be inferred. If any of the explicit statements of the
matrix 200 used as input are removed from theRDF databases 116, a computation question for thesystem 100 is which of the inferred statements A-C of thematrix 400 should be removed when any of the explicit statements 1-4 of thematrix 200 are deleted. The quick answer is that the inferred statement C should no longer hold true, computationally, and the query-answering process should not use statement C as input. More specifically, suppose that theexplicit statement 2 “ex:Person owl:equivalentClass ex:Human” is deleted; the computation question is then which of the inferred statements A-C should be removed. The quick answer is that the inferred statements B “ex:Peter rdf:type ex:Human” and C “ex:Peter rdf:type ex:Animal” suitably also should be removed. The following pieces of hardware and/or software elucidate this truth computation of inferred knowledge by thesystem 100 and/or the processes of amethod 6000. - The
system 100 avoids imposing a scalability restriction on the number of explicit statements stored in theRDF databases 116. Thesystem 100 can identify those inferred statements that suitably should be removed whenever an explicit statement is deleted (retracted). Thesystem 100 dynamically computes the truth using a combination of the forward-chaininghardware 112 and the backward-chaininghardware 114. Thesystem 100 is time-efficient, computes faster than a full re-computation, and need not use any long-lived truth maintenance information (space-efficient). - The
system 100 includes anexplicit knowledge hardware 102 whose structure is suitable for receiving explicit knowledge (explicit data or user data) in a form of explicit statements in RDF format. (See thematrix 200 ofFIG. 2 ). Theexplicit knowledge hardware 102 is communicable with an expiredexplicit knowledge hardware 104 whose structure is capable of receiving explicit statements that have expired or are to be deleted or retracted. Theexplicit knowledge hardware 102 forwards explicit knowledge in the form of explicit statements to a piece ofreasoner hardware 122, whose structure has a capacity to communicate with a piece ofinferred knowledge hardware 106. Theinferred knowledge hardware 106 is a piece of hardware whose structure has a capacity to compute inferred knowledge (implicit data or derived data) as inferred statements in RDF using a piece ofrule execution hardware 108. Therule execution hardware 108 is a structure suitable for executing a set of inference rules (see the matrix 300 ofFIG. 3 ) on the explicit statements to produce inferred knowledge in the form of inferred statements. Theinferred knowledge hardware 106 is communicable with a piece of expiredinferred knowledge hardware 110 whose structure is capable of computing expired inferred knowledge in the form of expired inferred statements (see thematrix 400 ofFIG. 4 ). The structure of thereasoner hardware 122 is suitable for communicating with a piece ofreason maintenance hardware 124 whose structure is capable of orchestrating the computation of the truth or correctness of the inferred statements. The structure of thereason maintenance hardware 124 is communicable with a piece of expiredinferred knowledge hardware 110 which uses a piece of forward-chaininghardware 112 whose structure has the capacity to execute forward-chaining inferences. The structure of the expiredinferred knowledge hardware 110 is also communicable with a piece of backward-chaininghardware 114 whose structure is capable of computing backward-chaining inferences. The structure of thereason maintenance hardware 124 is communicable with one ormore RDF databases 116 to remove expired inferred statements stored in theRDF databases 116 when certain explicit statements are expired or are to be deleted or retracted. A piece ofRDF retrieval hardware 120 accesses refreshed RDF information in theRDF databases 116 via acloud 118. -
FIG. 5 illustrates amatrix 500 that contains both the explicit statements and the computed inferred statements stored in theRDF databases 116. Thematrix 500 is presented in four columns. The first column is titled “#”, and recites either numerically or textually an identifier of an explicit or inferred statement that follows on a row. The second column is titled “Subject,” and recites the subject of either the explicit or inferred statement. The third column is titled “Predicate,” and recites the predicate portion of either the explicit or inferred statement. The last column is titled “Object,” and recites the object portion of the inferred or explicit statement. The first row recites an explicit statement whose identifier is “1”, whose subject is “ex:worksAt,” whose predicate is recited as “rdfs:domain,” and whose object is recited as “ex:Person.” The second row recites an explicit statement whose identifier is “2”, whose subject is “ex:Person,” whose predicate is recited as “owl:equivalentClass,” and whose object is recited as “ex:Human.” The third row recites an explicit statement whose identifier is “3”, whose subject is “ex:Human,” whose predicate is recited as “rdfs:subClassOf,” and whose object is recited as “ex:Animal.” The fourth row recites an explicit statement whose identifier is “4”, whose subject is “ex:Peter,” whose predicate is recited as “ex:worksAt,” and whose object is recited as “ex:IBM.” The fifth row recites an inferred statement whose identifier is “A”, whose subject is “ex:Peter,” whose predicate is recited as “rdf:type,” and whose object is recited as “ex:Person.” The sixth row recites an inferred statement whose identifier is “B”, whose subject is “ex:Peter,” whose predicate is recited as “rdf:type,” and whose object is recited as “ex:Human.” The seventh row recites an inferred statement whose identifier is “C”, whose subject is “ex:Peter,” whose predicate is recited as “rdf:type,” and whose object is recited as “ex:Animal.” -
FIGS. 6A-6H are process diagrams implementing amethod 6000 for facilitating correctness of inferred knowledge without stored truth maintenance information when explicit knowledge expires. From a start block, themethod 6000 proceeds to a set of method steps 6002 defined between a continuation terminal (“Terminal A”) and another continuation terminal (“Terminal B”). The set of method steps 6002 executes steps which are capable of receiving explicit statements some of which have expired (or been deleted). From Terminal A (FIG. 6B ), the method proceeds to block 6008 where the method receives an RDF document. Atblock 6010, the method extracts explicit knowledge (explicit statements) in RDF tuples (subjects, predicates, and objects) from the RDF document. Next, atdecision block 6012, a test is performed to determine whether there are one or more pieces of knowledge that have expired. If the answer to the test atdecision block 6012 is NO, the method proceeds to Terminal A and skips back to block 6008 where the above-identified processing steps are repeated. If the answer to the test atdecision block 6012 is YES, the method proceeds to block 6014 where the method marks the piece or pieces of knowledge (explicit statement[s]) that have expired or are to be deleted. The method then continues to Terminal B. - From Terminal B (
FIG. 6A ), the method proceeds to a set ofmethod steps 6004 defined between a continuation terminal (“Terminal C”) and another continuation terminal (“Terminal D”). The set of method steps 6004 executes steps having a capacity to compute inferred statements from the explicit statements. From Terminal C (FIG. 6C ), the method proceeds to block 6016 where the method receives a set of inference rules. The method then continues to another continuation terminal (“Terminal C1”) and further proceeds to block 6018 where, using the set of inference rules, the method infers a piece of inferred knowledge (inferred statement). The method then proceeds todecision block 6020 where a test is performed to determine whether there is additional knowledge to be inferred. If the answer to the test atdecision block 6020 is YES, the method continues to Terminal C1 and skips back to block 6018 where the above-identified processing steps are repeated. Otherwise, if the answer to the test atdecision block 6020 is NO, the method proceeds to block 6022 where the method collates pieces of inferred knowledge (as a set or sets of inferred statements). The method then continues to Terminal D. - From Terminal D (
FIG. 6A ), the method proceeds to a set of method steps 6006 defined between a continuation terminal (“Terminal E”) and another continuation terminal (“Terminal F”). The set of method steps 6006 executes steps suitable for finding a set of inferred statements to be deleted to facilitate correctness of the inferred knowledge. From Terminal E (FIG. 6D ), the method proceeds to block 6024 where the method sets a visited flag of each explicit statement to be deleted as false (meaning that the method has not computed the ramification of an expiry of a piece of explicit knowledge). Atblock 6026, the method copies a set of expired explicit statements (E) to temporary variables (F and B) in preparation for truth maintenance computation. The method then continues to another continuation terminal (“Terminal E1”). The method proceeds further todecision block 6028 where a test is performed to determine whether there is no expired explicit statement whose visited flag has a false value. If the answer to the test atdecision block 6028 is YES, the method continues to another continuation terminal (“Terminal E9”). Otherwise, if the answer to the test atdecision block 6028 is NO, the method proceeds to another continuation terminal (“Terminal E2”). From Terminal E2 (FIG. 6D ), the method proceeds to block 6030 where the method selects an expired explicit statement in the temporary variable F and sets its visited flag to be true. The method then continues to another continuation terminal (“Terminal E3”). - From Terminal E3 (
FIG. 6E ), the method proceeds to block 6032 where the method executes forward-chaining computation by executing the set of inference rules. Atblock 6034, the method allows each inference rule to make joins across a sum of statements, one summand being the set of explicit statements E and the other summand being the set of inferred statements J. Atblock 6036, the method disallows any joins to be made from any expired explicit statements in the temporary variable F. Atblock 6038, the method stores the output of the forward-chaining computation with a set of expired inferred statements (to be deleted) (K). The method then continues to another continuation terminal (“Terminal E4”). From Terminal E4 (FIG. 6E ), the method proceeds to block 6040 where the method selects a statement in the temporary variable B. Atblock 6042, the method prepares to execute backward-chaining computation on the selected statement. The method then continues to another continuation terminal (“Terminal E5”). - From Terminal E5 (
FIG. 6F ), the method proceeds to block 6044 where the method creates a modified rule. Atblock 6046, the modified rule is created by substituting the values of the subject, predicate, and object from the selected statement into the heads of rules R and a rule's bodies (or rules' bodies). Atblock 6048, the method then uses the modified rule as a query to an RDF database. Atblock 6050, the method allows a query answering process to use a sum of statements as input, one summand being the set of explicit statements E and the other being the set of inferred statements J. Atblock 6052, the method disallows any input statements to be formed from any expired explicit statements in the temporary variable F. Atblock 6054, the method attempts to obtain a result from application of any of the rules based on the rule's bodies. The method then continues to another continuation terminal (“Terminal E6”). - From Terminal E6 (
FIG. 6G ), the method proceeds to adecision block 6056 where a test is performed to determine whether the selected statement can be computed from other statements. If the answer to the test atdecision block 6056 is NO, the method continues to another continuation terminal (“Terminal E7”). Otherwise, if the answer to the test atdecision block 6056 is YES, the method proceeds to block 6058, where the method removes the selected statement from the temporary variable B and copies the contents of the temporary variable B into the temporary variable F. The method then continues to Terminal E7 and further proceeds todecision block 6060 where a test is performed to determine whether the temporary variable B has another statement. If the answer to the test atdecision block 6060 is NO, the method proceeds to another continuation terminal (“Terminal E8”). Otherwise, if the answer to the test atdecision block 6060 is YES, the method proceeds to Terminal E4 and skips back to block 6040 where the above-identified processing steps are repeated. - From Terminal E8 (
FIG. 6H ), the method proceeds todecision block 6062 where a test is performed to determine whether the temporary variable F has another statement. If the answer to the test atdecision block 6062 is NO, the method proceeds to Terminal E1 and skips back todecision block 6028 where the above-identified processing steps are repeated. Otherwise, if the answer to the test atdecision block 6062 is YES, the method proceeds to Terminal E2 and skips back to block 6030 where the above-identified processing steps are repeated. From Terminal E9 (FIG. 6H ), the method proceeds to block 6064 where the method sets the set of expired inferred statement K to the contents of the temporary variable F without any of the expired explicit statements L. Atblock 6066, the method facilitates a computation of truth maintenance information without committing a full re-computation or using any truth maintenance information. The method then continues to Terminal F and terminates execution. - While illustrative embodiments have been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.
Claims (20)
1. A system of hardware for implementing reason maintenance, comprising:
a piece of reasoner hardware which structure has a capacity to communicate with a piece of inferred knowledge hardware and which structure has a capacity to compute RDF inferred statements; and
a piece of reason maintenance hardware which structure is capable of orchestrating computation of correctness of the RDF inferred statements without stored truth maintenance information when one or more RDF explicit statements are deleted from an RDF database.
2. The system of claim 1 , further comprising a piece of explicit knowledge hardware whose structure is suitable for receiving the one or more RDF explicit statements deleted and which is further capable of communicating with the reasoner hardware.
3. The system of claim 2 , further comprising a piece of expired explicit hardware which structure is capable of receiving explicit statements that are to be deleted and which is further capable of communicating with the explicit knowledge hardware.
4. The system of claim 1 , further comprising a piece of rule execution hardware which structure is suitable for executing a set of inference rules on the one or more RDF explicit statements to compute the RDF inferred statements.
5. The system of claim 1 , further comprising a piece of expired inferred knowledge hardware which structure is capable of computing expired inferred statements and is further capable of communicating with the reason maintenance hardware.
6. The system of claim 1 , further comprising a piece of forward-chaining hardware which structure has a capacity to execute forward-chaining inferences and which is further capable of communicating with the reason maintenance hardware.
7. The system of claim 1 , further comprising a piece of backward-chaining hardware which structure has a capacity to execute backward-chaining inferences and which is further capable of communicating with forward-chaining hardware.
8. A method for reason maintenance of an RDF database, comprising:
receiving explicit statements including a set of deleted explicit statements;
computing inferred statements from the explicit statements; and
finding a set of inferred statements to be deleted from the inferred statements to facilitate correctness of the inferred statements without using stored truth maintenance information.
9. The method of claim 8 , further comprising copying the set of deleted explicit statements into a first and second temporary variable.
10. The method of claim 9 , further comprising executing forward-chaining inferences using a set of inference rules to make joins across the explicit statements and the inferred statements but not the set of deleted explicit statements.
11. The method of claim 10 , further comprising storing an output of executing forward-chaining inferences into the set of inferred statements to be deleted.
12. The method of claim 11 , further comprising executing backward-chaining inferences using the set of inference rules to check whether a deleted explicit statement in the second temporary variable can still be computed from the explicit statements and the inferred statements.
13. The method of claim 12 , further comprising substituting values of a subject, predicate, and object of the deleted explicit statement in the second temporary variable into heads of the set of inference rules and bodies of the set of inference rules, to produce a query.
14. The method of claim 13 , further comprising causing the query to be submitted to a query answering process in which input statements can be chosen from the explicit statements and the inferred statements, but not the set of deleted explicit statements.
15. The method of claim 14 , further comprising testing whether the deleted explicit statement in the second temporary variable can be computed from the explicit statements and the inferred statements, and removing the deleted explicit statement in the second temporary variable if the testing is affirmative.
16. The method of claim 15 , further comprising copying the contents of the second temporary variable into the first temporary variable.
17. The method of claim 16 , further comprising repeating the method until each explicit statement and inferred statement has been visited by the method.
18. The method of claim 17 , further comprising setting the set of inferred statements to be deleted to the contents of the first temporary variable without the set of deleted explicit statements.
19. The method of claim 18 , further comprising terminating the method.
20. A computer-readable medium, which is non-transitory, having computer-executable instructions stored thereon for implementing a method for reason maintenance of an RDF database, comprising:
receiving explicit statements including a set of deleted explicit statements;
computing inferred statements from the explicit statements; and
finding a set of inferred statements to be deleted from the inferred statements to facilitate correctness of the inferred statements without using stored truth maintenance information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/924,209 US20140006333A1 (en) | 2012-06-21 | 2013-06-21 | Correcting inferred knowledge for expired explicit knowledge |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261662685P | 2012-06-21 | 2012-06-21 | |
US13/924,209 US20140006333A1 (en) | 2012-06-21 | 2013-06-21 | Correcting inferred knowledge for expired explicit knowledge |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140006333A1 true US20140006333A1 (en) | 2014-01-02 |
Family
ID=49779211
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/924,209 Abandoned US20140006333A1 (en) | 2012-06-21 | 2013-06-21 | Correcting inferred knowledge for expired explicit knowledge |
Country Status (1)
Country | Link |
---|---|
US (1) | US20140006333A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10158694B1 (en) * | 2015-11-19 | 2018-12-18 | Total Resource Management, Inc. | Method and apparatus for modifying asset management software for a mobile device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020174126A1 (en) * | 2001-05-15 | 2002-11-21 | Britton Colin P. | Methods and apparatus for real-time business visibility using persistent schema-less data storage |
US20050149484A1 (en) * | 2001-05-25 | 2005-07-07 | Joshua Fox | Run-time architecture for enterprise integration with transformation generation |
US20070185930A1 (en) * | 2006-02-06 | 2007-08-09 | International Business Machines Corporation | System, method and program product for adding, updating and removing RDF statements stored on a server |
US20080126399A1 (en) * | 2006-06-29 | 2008-05-29 | Macgregor Robert M | Method and apparatus for optimizing data while preserving provenance information for the data |
US20100049687A1 (en) * | 2008-08-19 | 2010-02-25 | Northrop Grumman Information Technology, Inc. | System and method for information sharing across security boundaries |
US8037108B1 (en) * | 2009-07-22 | 2011-10-11 | Adobe Systems Incorporated | Conversion of relational databases into triplestores |
US20120150922A1 (en) * | 2010-12-13 | 2012-06-14 | Aravind Yalamanchi | Extensible rdf databases |
-
2013
- 2013-06-21 US US13/924,209 patent/US20140006333A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020174126A1 (en) * | 2001-05-15 | 2002-11-21 | Britton Colin P. | Methods and apparatus for real-time business visibility using persistent schema-less data storage |
US20050149484A1 (en) * | 2001-05-25 | 2005-07-07 | Joshua Fox | Run-time architecture for enterprise integration with transformation generation |
US20070185930A1 (en) * | 2006-02-06 | 2007-08-09 | International Business Machines Corporation | System, method and program product for adding, updating and removing RDF statements stored on a server |
US20080126399A1 (en) * | 2006-06-29 | 2008-05-29 | Macgregor Robert M | Method and apparatus for optimizing data while preserving provenance information for the data |
US20100049687A1 (en) * | 2008-08-19 | 2010-02-25 | Northrop Grumman Information Technology, Inc. | System and method for information sharing across security boundaries |
US8037108B1 (en) * | 2009-07-22 | 2011-10-11 | Adobe Systems Incorporated | Conversion of relational databases into triplestores |
US20120150922A1 (en) * | 2010-12-13 | 2012-06-14 | Aravind Yalamanchi | Extensible rdf databases |
Non-Patent Citations (7)
Title |
---|
Broekstra, Jeen, and Arjohn Kampman. " encing and Truth Maintenance in RDF Schema." PSSS 89 (2003). * |
Hartig, Olaf. "Querying trust in rdf data with tsparql." The Semantic Web: Research and Applications. Springer Berlin Heidelberg, 2009. 5-20. * |
Husain, Mohammad Farhan, et al. "Heuristics-based query processing for large RDF graphs using cloud computing." Knowledge and Data Engineering, IEEE Transactions on 23.9 (2011): 1312-1327. * |
Kang, Seung Hwan, and Sim Kim Lau. "Ontology revision using the concept of belief revision." Knowledge-Based Intelligent Information and Engineering Systems. Springer Berlin Heidelberg, 2004. * |
Konstantinidis, George, et al. "A Formal Approach for RDF/S Ontology Evolution." ECAI. 2008. * |
Mazzieri, Mauro, and Aldo Franco Dragoni. "Ontology Revision as Non-Prioritized Belief Revision." ESOE 2007 (2007): 58-69. * |
Ribeiro, M., et al. "Belief contraction in web-ontology languages." Proceedings of the 3rd International Workshop on Ontology Dynamics, IWOD. 2009. * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10158694B1 (en) * | 2015-11-19 | 2018-12-18 | Total Resource Management, Inc. | Method and apparatus for modifying asset management software for a mobile device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11893133B2 (en) | Budget tracking in a differentially private database system | |
US10402453B2 (en) | Utilizing large-scale knowledge graphs to support inference at scale and explanation generation | |
Niu et al. | An effective rule miner for instance matching in a web of data | |
Dias et al. | Applying the JBOS reduction method for relevant knowledge extraction | |
Combi et al. | Mining approximate temporal functional dependencies with pure temporal grouping in clinical databases | |
Medina et al. | Indexing techniques to improve the performance of necessity-based fuzzy queries using classical indexing of RDBMS | |
Wudage Chekol et al. | Fast interval joins for temporal SPARQL queries | |
US20140006333A1 (en) | Correcting inferred knowledge for expired explicit knowledge | |
d'Amato et al. | Data-driven logical reasoning | |
Zhang et al. | A distance-based framework for inconsistency-tolerant reasoning and inconsistency measurement in DL-Lite | |
US10726013B2 (en) | Information processing device, information processing method, and recording medium | |
Meneghetti et al. | Output-sensitive evaluation of prioritized skyline queries | |
Jacyntho et al. | A multigranularity locking model for RDF | |
Frimpong | Ontology matching algorithms for data model alignment in big data | |
Peim et al. | Estimating the quality of answers when querying over description logic ontologies | |
Yamazaki et al. | A Scalable and Plug-in Based System to Construct A Production-Level Knowledge Base. | |
Zgrzywa | Consensus Determining with Dependencies of Attributes with Interval Values. | |
Shi et al. | Query optimization in cooperation with an ontological reasoning service | |
Blume et al. | Towards flexible indices for distributed graph data: The formal schema-level index model FLuID | |
Denzler et al. | A granular approach for identifying user knowledge | |
WO2015047073A1 (en) | Method for performing distributed reasoning over linked data | |
Bedi et al. | Fuzzy dimension to databases | |
Alsinet et al. | A probabilistic author-centered model for Twitter discussions | |
Youngmann et al. | Summarized Causal Explanations For Aggregate Views | |
CAFARELLA | Summarized Causal Explanations For Aggregate Views |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ONTOTEXT AD, BULGARIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OGNYANOV, DAMYAN;VELKOV, RUSLAN;REEL/FRAME:030876/0639 Effective date: 20130625 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |